An evil twin is a rogue Wi-Fi access point that mimics a legitimate network. Attackers use it to intercept and manipulate traffic, making it an on-path (formerly MITM) attack opportunity.
Breakdown of Options:
A. Phishing – Tries to steal credentials through fake emails/websites but does not intercept network traffic.
B. Dumpster diving – Involves physical security breaches, not network interception.
C. Evil twin – ✅ Correct answer. A rogue Wi-Fi AP impersonates a real network, allowing traffic interception.
D. Tailgating – Involves physical access security, not network interception.
[Reference:, CompTIA Network+ (N10-009) Official Study Guide – Domain 3.3: Explain common network security threats., , , , ]
Submit